


default search action
Information and Computer Security, Volume 33
Volume 33, Number 1, 2025
- Fredrik Karlsson, Shang Gao

:
Guest editorial: New frontiers in information security management. 1-4 - Mari Aarland:

Cybersecurity in digital supply chains in the procurement process: introducing the digital supply chain management framework. 5-24 - Marcus Gerdin:

Validating and extending the unified model of information security policy compliance. 25-48 - Hassan Jamil

, Tanveer A. Zia
, Tahmid Nayeem, Monica T. Whitty
, Steven D'Alessandro:
Human-centric cyber security: Applying protection motivation theory to analyse micro business owners' security behaviours. 49-76 - Thai Pham, Farkhondeh Hassandoust:

Information security policy effectiveness: a managerial perspective of the financial industry in Vietnam. 77-95 - Tugçe Karayel, Bahadir Aktas, Adem Akbiyik:

Human factors in remote work: examining cyber hygiene practices. 96-116 - Xiaoguang Tian

:
Unraveling the dynamics of password manager adoption: a deeper dive into critical factors. 117-139
Volume 33, Number 2, 2025
- Joakim Kävrestad, Felicia Burvall, Marcus Nohlberg:

A taxonomy of factors that contribute to organizational Cybersecurity Awareness (CSA). 141-160 - Garret Murray, Malin Falkeling, Shang Gao

:
Trends and challenges in research into the human aspects of ransomware: a systematic mapping study. 161-195 - Michael J. Rooney, Yair Levy, Wei Li, Ajoy Kumar:

Comparing experts' and users' perspectives on the use of password workarounds and the risk of data breaches. 196-222 - Gregor Petric, Spela Orehek:

Expressing opinions about information security in an organization: the spiral of silence theory perspective. 223-241 - Kristiina Ahola, Marcus A. Butavicius, Agata McCormac, Daniel Sturman:

Hey "CSIRI", should I report this? Investigating the factors that influence employees to report cyber security incidents in the workplace. 242-266 - Keith S. Jones, McKenna K. Tornblad, Miriam E. Armstrong, Jinwoo Choi, Akbar Siami Namin:

The effects of persuasion principles on perceived honesty during shoulder surfing attacks. 267-283
Volume 33, Number 3, 2025
- Publisher's note. 285-286

- Luzuko Tekeni, Reinhardt A. Botha

:
Understanding the factors that motivate South African home fibre users to protect their home networking devices: a protection motivation theory. 287-308 - Martina Neri

, Elisabetta Benevento, Alessandro Stefanini, Davide Aloini, Federico Niccolini, Annalaura Carducci, Ileana Federigi, Gianluca Dini:
Understanding information security awareness: evidence from the public healthcare sector. 309-319 - Israa Abuelezz, Mahmoud Barhamgi, Armstrong Nhlabatsi, Khaled Md. Khan, Raian Ali

:
How demographic and appearance cues of a potential social engineer influence trust perception and risk-taking among targets? 320-343 - Cláudia Ascenção, Henrique Teixeira

, João Gonçalves, Fernando Almeida
:
Large-scale agile security practices in software engineering. 344-361 - Ahmed Ali Otoom

, Issa Atoum
, Heba Al-Harahsheh, Mahmoud Mohammad Aljawarneh, Mohammed N. Al-Refai, Mahmoud Baklizi:
A collaborative cybersecurity framework for higher education. 362-389 - Berhanu Aebissa

, Gurpreet Dhillon, Million Meshesha
:
Information security policy compliance: a replication study in Ethiopia. 408-426 - Apostolos Xenakis, Vasileios Vlachos, Pedro Juan Roig, Salvador Alcaraz:

Addressing the necessity of cybersecurity literacy: the case of ETTCS CyberTeach project. 427-451
Volume 33, Number 4, 2025
- Zhiying Wang, Hangyu Deng, Guiyun Li:

Enhancing information security compliance behavior through knowledge interventions: insights from EEG. 453-472 - Angélica Pigola, Priscila Rezende da Costa:

Cybersecurity management: an empirical analysis of dynamic capabilities framework for enhancing cybersecurity intelligence. 473-498 - Noluxolo Gcaza, Kerry-Lynn Thomson:

Factors contributing to the successful development of cyber safety education for foundation phase children: a systematic literature review. 499-519 - Amir Schreiber, Ilan Schreiber:

AI for cyber-security risk: harnessing AI for automatic generation of company-specific cybersecurity risk profiles. 520-546 - Resti Dwi Fitri, Muhammad Hilman, Setiadi Yazid:

Improving password policy strategies: a government employee perspective. 547-572 - Kemal Elciyar:

Users' privacy behaviors in response to WhatsApp policy changes. 573-589 - Hongjiang Xu:

Users' perceptions of managerial measurements for cloud computing's cybersecurity - importance-performance analysis. 590-612 - Santosh Saklani, Anshul Kalia:

Severity prediction of software vulnerabilities using convolutional neural networks. 613-630 - Rafael De Queiroz Batista, Eduardo de Rezende Francisco:

Information security: the dilemma of the effectiveness of investments when the expected result is that nothing happens. 631-648 - Barbara N. Kayondo, Michael Kyobe:

Influence of trust on hospital staff compliance with the data protection act, moderated by noncompliance costs - a Ugandan case study. 649-669
Volume 33, Number 5, 2025
- Christian Matt Graham:

AI skills in cybersecurity: global job trends analysis. 673-689 - Martin Grill, Teodor Sommestad, Henrik Karlzén, Anders Pousette:

Training for improved information security culture: a longitudinal randomized controlled trial. 690-718 - Ken Zi Lim, Hui Na Chua, Siew Fan Wong:

Examining the factors leading to URL fact-checking behavior among internet users. 719-743 - Dominyka Venciute, Lukas Barasnevicius, Ricardo Correia, Vida Skudiene:

The impact of message appeal on consumer behavioural engagement in the cybersecurity industry: the role of endorser type. 744-765 - Marcus Dansarie, Marcus Nohlberg:

User adoption of TETRA mobile radio communication networks: an information security perspective. 766-784 - Smriti Srivastava, Gurpreet Dhillon, Rasleen Kaur, Simran Dhillon:

Understanding the impact of positive and negative user affect on information security. 785-806 - Sunitha Prabhu, David Kocsis, Tek Yew Lew:

Beyond the direct impact of sanctions and subjective norms in cybersecurity. 807-825 - Christian Matt Graham:

Enhancing cybersecurity: a semantic network analysis of MITRE ATT&CK® techniques. 826-844 - Jaime C. Auton, Daniel Sturman:

Persuasion under pressure: the influence of persuasion principles and time constraints on phishing email susceptibility. 845-859 - Ramesh Krishna Mahimalur:

Implementing security governance for remote work: challenges and best practices. 860-870

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














